Troubleshooting
Unusual Network Activity
The switch does not receive a response to RADIUS authentication
requests.
In this case, the switch will attempt authentication using the
secondary method configured for the type of access you are using (console,
Telnet, or SSH).
There can be several reasons for not receiving a response to an authentication
request. Do the following:
■
Use
ping
to ensure that the switch has access to the configured RADIUS
servers.
■
Verify that the switch is using the correct encryption key (RADIUS secret
key) for each server.
■
Verify that the switch has the correct IP address for each RADIUS server.
■
Ensure that the
radius-server timeout
period is long enough for network
conditions.
The switch does not authenticate a client even though the RADIUS
server is properly configured and providing a response to the
authentication request.
If the RADIUS server configuration for authenti
cating the client includes a VLAN assignment, ensure that the VLAN exists as
a static VLAN on the switch. Refer to “How 802.1X Authentication Affects
VLAN Operation” in the
Access Security Guide
for your switch.
During RADIUS-authenticated client sessions, access to a VLAN on the
port used for the client sessions is lost.
If the affected VLAN is config
ured as untagged on the port, it may be temporarily blocked on that port during
an 802.1X session. This is because the switch has temporarily assigned another
VLAN as untagged on the port to support the client access, as specified in the
response from the RADIUS server. Refer to “How 802.1X Authentication
Affects VLAN Operation” in the
Access Security Guide
for your switch.
The switch appears to be properly configured as a supplicant, but
cannot gain access to the intended authenticator port on the switch
to which it is connected.
If
aaa authentication port-access
is configured for
Local, ensure that you have entered the local
login
(operator-level) username
and password of the authenticator switch into the
identity
and
secret
parame
ters of the supplicant configuration. If instead, you enter the enable (manager
level) username and password, access will be denied.
C-12
Содержание ProCurve 6120G/XG
Страница 1: ...ProCurve Series 6120 Switches Management and Configuration Guide November 2010 Version Z 14 22 ...
Страница 2: ......
Страница 3: ...HP ProCurve 6120G XG Switch 6120XG Switch November 2010 Z 14 22 Management and Configuration Guide ...
Страница 24: ...xxii ...
Страница 40: ...Getting Started To Set Up and Install the Switch in Your Network 1 10 ...
Страница 54: ...Selecting a Management Interface Advantages of Using ProCurve Manager or ProCurve Manager Plus 2 14 ...
Страница 70: ...Using the Menu Interface Where To Go From Here 3 16 ...
Страница 92: ...Using the ProCurve Web Browser Interface Contents Setting Fault Detection Policy 5 25 5 2 ...
Страница 160: ...Switch Memory and Configuration Automatic Configuration Update with DHCP Option 66 6 44 ...
Страница 288: ...Port Status and Configuration Uplink Failure Detection 10 42 ...
Страница 318: ...Port Trunking Outbound Traffic Distribution Across Trunked Links 11 30 ...
Страница 470: ...File Transfers Copying Diagnostic Data to a Remote Host USB Device PC or UNIX Workstation A 34 ...
Страница 487: ...Monitoring and Analyzing Switch Operation Status and Counters Data B 17 ...
Страница 518: ...Monitoring and Analyzing Switch Operation Traffic Mirroring B 48 ...
Страница 612: ...MAC Address Management Viewing the MAC Addresses of Connected Devices D 8 ...
Страница 616: ...Monitoring Resources When Insufficient Resources Are Available E 4 ...
Страница 620: ...Daylight Savings Time on ProCurve Switches F 4 ...
Страница 638: ...Network Out of Band Management OOBM Tasks G 18 ...
Страница 659: ...download to primary or secondary flash A 21 using to download switch software A 19 Index 19 ...
Страница 660: ...20 Index ...
Страница 661: ......